Please enable JavaScript to use CodeHS

Standards Mapping

for Florida 9-12


Standards in this Framework


Standards Mapped


Mapped to Course

Standard Lessons
Evaluate modes of communication and collaboration
Select appropriate tools within a project environment to communicate with project team members.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
Collect, analyze, and present information using a variety of computing devices (e.g., probes, sensors, and handheld devices).
Develop a collaborative digital product using collaboration tools (e.g., version control systems and integrated development environments).
Communicate and publish key ideas and details to a variety of audiences using digital tools and media-rich resources.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 9.1 Project: Security Assessment Report
  4. 12.1 Methodology
  5. 12.2 Support Practice
Identify how collaboration influences the design and development of software artifacts.
Evaluate program designs and implementations written by others for readability and usability.
Analyze data and identify real-world patterns through modeling and simulation.
Formulate, refine, and test scientific hypotheses using models and simulations.
Explain how data analysis is used to enhance the understanding of complex natural and human systems.
Compare techniques for analyzing massive data collections.
  1. 8.4 Databases
Represent and understand natural phenomena using modeling and simulation.
Explain intractable problems and understand that problems exists that are computationally unsolvable (e.g., classic intractable problems include the Towers of Hanoi and the Traveling Salesman Problem -TSP).
Describe the concept of parallel processing as a strategy to solve large problems.
Demonstrate concurrency by separating processes into threads of execution and dividing data into parallel streams.
Divide a complex problem into simpler parts by using the principle of abstraction to manage complexity (i.e., by using searching and sorting as abstractions) using predefined functions and parameters, classes, and methods.
Evaluate a classical algorithms and implement an original algorithm
Evaluate various data types and data structures.
  1. 4.5 Arrays and Objects
Explain how sequence, selection, iteration, and recursion are building blocks of algorithms.
  1. 4.4 Branching
  2. 21.1 Challenge Problems
  3. 22.4 If Statements
  4. 22.6 General For Loops
  5. 22.7 For Loop Practice
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
Decompose a problem by defining new functions and classes
  1. 4.2 Programming with Karel
  2. 4.3 Looping
Evaluate ways to characterize how well algorithms perform and that two algorithms can perform differently for the same task.
  1. 21.1 Challenge Problems
Design and implement a simple simulation algorithm to analyze, represent, and understand natural phenomena.
Evaluate algorithms by their efficiency, correctness, and clarity (e.g., by analyzing and comparing execution times, testing with multiple inputs or data sets, and by debugging).
  1. 21.1 Challenge Problems
Compare and contrast simple data structures and their uses.
  1. 4.5 Arrays and Objects
Explain how automated software testing can reduce the cost of the testing effort.
Explain what tools are applied to provide automated testing environments.
Describe digital tools or resources to use for a real-world task based on their efficiency and effectiveness.
Evaluate different file types for different purposes (e.g., word processing, images, music, and three-dimensional drawings).
  1. 7.3 Compatibility
  2. 7.4 Software and Applications
Describe a software development process that is used to solve problems at different software development stages (e.g., design, coding, testing, and verification).
Describe the organization of a computer and identify its principal components by name, function, and the flow of instructions and data between components (e.g., storage devices, memory, CPU, graphics processors, IO and network ports).
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
  3. 11.2 Peripheral Devices
Differentiate between multiple levels of hardware and software (such as CPU hardware, operating system, translation, and interpretation) that support program execution.
  1. 7.1 Operating Systems
  2. 11.1 Internal Components
Evaluate various forms of input and output (e.g., IO and storage devices and digital media).
  1. 11.2 Peripheral Devices
Develop and evaluate criteria for purchasing or upgrading computer system hardware (e.g., Wi-Fi, mobile devices, home and office machines).
  1. 7.3 Compatibility
  2. 11.3 Network Devices
  3. 11.5 Network Options
Develop criteria for selecting appropriate hardware and software when solving a specific real-world problem (such as business, educational, personal).
  1. 7.3 Compatibility
  2. 7.4 Software and Applications
  3. 11.1 Internal Components
  4. 11.2 Peripheral Devices
Develop a software artifact (independently and collaboratively) in phases (or stages) according to a common software development methodology (e.g., Waterfall or Spiral model)
Evaluate the basic components of computer networks.
  1. 10.1 Introduction to the Internet
  2. 10.4 Internet Hardware and Sending Information
  3. 10.5 Internet Addresses
  4. 10.6 Domain Name System (DNS)
  5. 10.7 Routing
  6. 10.8 Packets & Protocols
  7. 10.9 Viewing a Webpage
  8. 11.3 Network Devices
  9. 11.5 Network Options
  10. 19.13 Viewing Websites
Analyze historical trends in hardware and software to assess implications on computing devices for the future (e.g., upgrades for power/energy, computation capacity, speed, size, ease of use).
  1. 7.9 Command Line Interface
  2. 11.3 Network Devices
  3. 11.5 Network Options
Identify and select the most appropriate file format based on trade-offs (e.g., open file formats, text, proprietary and binary formats, compression and encryption formats).
Describe the issues that impact network functionality (e.g., latency, bandwidth, firewalls and server capability).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
  3. 11.5 Network Options
  4. 11.6 Network Communication
Describe common network protocols, such as IP, TCP, SMTP, HTTP, and FTP, and how these are applied by client-server and peer-to-peer networks.
  1. 8.5 Clients and Servers
  2. 10.5 Internet Addresses
  3. 10.8 Packets & Protocols
  4. 11.3 Network Devices
Describe the unique features of computers embedded in mobile devices and vehicles
Describe the common physical and cognitive challenges faced by users when learning to use software and hardware.
Describe the process of designing software to support specialized forms of human-computer interaction.
Explain the notion of intelligent behavior through computer modeling and robotics.
Describe common measurements of machine intelligence (e.g., Turing test).
Describe a few of the major branches of artificial intelligence (e.g., expert systems, natural language processing, machine perception, machine learning).
Describe major applications of artificial intelligence and robotics, including, but not limited to, the medical, space, and automotive fields
Evaluate effective uses of Boolean logic (e.g., using “not”, “or”, “and”) to refine searches for individual and collaborative projects.
  1. 2.5 Information Literacy
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
Perform advanced searches to locate information and/or design a data-collection approach to gather original data (e.g., qualitative interviews, surveys, prototypes, and simulations).
Analyze and manipulate data collected by a variety of data collection techniques to support a hypothesis.
Collect real-time data from sources such as simulations, scientific and robotic sensors, and device emulators, using this data to formulate strategies or algorithms to solve advanced problems.
Explain the program execution process (by an interpreter and in CPU hardware).
  1. 4.1 Programming Concepts
Design and implement a program using global and local scope.
Implement a program using an industrial-strength integrated development environment
Facilitate programming solutions using application programming interfaces (APIs) and libraries.
  1. 21.1 Challenge Problems
Explain the role of an API in the development of applications and the distinction between a programming language’s syntax and the API.
Describe a variety of commonly used programming languages.
  1. 4.1 Programming Concepts
Classify programming languages by paradigm and application domain (e.g., imperative, functional, and logic languages) and evaluate their application to domains such as web programming, symbolic processing and data/numerical processing.
Create a computational artifact, individually and collaboratively, followed by reflection, analysis, and iteration (e.g., data-set analysis program for science and engineering fair, capstone project that includes a program, term research project based on program data).
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
  3. 19.15 Your First Website
  4. 21.1 Challenge Problems
Create mobile computing applications and/or dynamic web pages through the use of a variety of design and development tools, programming languages, and mobile devices/emulators.
Compare and contrast appropriate and inappropriate social networking behaviors.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
Describe and demonstrate ethical and responsible use of modern communication media and devices.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
Evaluate the impacts of irresponsible use of information (e.g., plagiarism and falsification of data) on collaborative projects.
  1. 2.6 Creative Credit & Copyright
Explain the principles of cryptography by examining encryption, digital signatures, and authentication methods (e.g., explain why and how certificates are used with “https” for authentication and encryption)
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 5.3 Basic Crypto Systems: Caesar Cipher
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
Implement an encryption, digital signature, or authentication method.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
Describe computer security vulnerabilities and methods of attack, and evaluate their social and economic impact on computer systems and people.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.3 Internet Safety
  4. 2.4 Privacy & Security
  5. 7.6 Application Security
  6. 8.9 Common Security Problems
  7. 8.11 Types of SQLi and Prevention
Describe how the Internet facilitates global communication
Identify ways to use technology to support lifelong learning
Discuss and analyze the impact of values and points of view that are presented in media messages (e.g., racial, gender, and political).
Analyze the positive and negative impacts of technology on popular culture and personal life
  1. 1.3 Impact of Cybersecurity
  2. 2.1 Digital Footprint and Reputation
  3. 10.10 Impact of the Internet
Construct strategies to combat cyberbullying or online harassment.
  1. 2.1 Digital Footprint and Reputation
  2. 2.2 Cyberbullying
  3. 2.3 Internet Safety
Describe the impact of computing on business and commerce (e.g., automated inventory processing, financial transactions, e-commerce, virtualization, and cloud computing).
Describe how technology has changed the way people build and manage organizations and how technology impacts personal life.
Evaluate ways in which adaptive technologies may assist users with special needs
Explain how societal and economic factors are affected by access to critical information.
Describe and evaluate the challenges (e.g., political, social, and economic) in providing equal access and distribution of technology in a global society
  1. 10.10 Impact of the Internet
Construct writings and/or communications using developmentally appropriate terminology
  1. 9.1 Project: Security Assessment Report
  2. 12.1 Methodology
  3. 12.2 Support Practice
Explore a variety of careers to which computing is central.
  1. 8.4 Databases
  2. 8.9 Common Security Problems
Predict future careers and the technologies that may exist based on current technology trends.
Evaluate the quality of digital resources for reliability (i.e., currency, relevancy, authority, accuracy, and purpose of digital information)
  1. 2.5 Information Literacy
Evaluate the accuracy, relevance, comprehensiveness, appropriateness, and bias of electronic information resources.
  1. 2.5 Information Literacy
Conduct research using peer reviewed articles, newspapers, magazine articles, and online books.
  1. 3.1 Project: Public Service Announcement
Analyze and evaluate public/government resources and describe how using these resources for communication can affect change
Describe how different types of software licenses (e.g., open source and proprietary licenses) can be used to share and protect intellectual property.
  1. 7.5 Software Licenses
Explain how access to information may not include the right to distribute the information.
  1. 2.6 Creative Credit & Copyright
Describe differences between open source, freeware, and proprietary software licenses, and how they apply to different types of software.
  1. 7.5 Software Licenses
Describe security and privacy issues that relate to computer networks.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security
  3. 11.6 Network Communication
Identify computer-related laws and analyze their impact on digital privacy, security, intellectual property, network access, contracts, and harassment.
Describe security and privacy issues that relate to computer networks including the permanency of data on the Internet, online identity, and privacy
  1. 2.1 Digital Footprint and Reputation
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
Evaluate and use digital citation tools to cite sources.
  1. 3.1 Project: Public Service Announcement
Describe the impact of government regulation on privacy and security.